-
1
-
-
84902292575
-
Rechtsfragen des Cloud Computing - EiN Zwischenbericht
-
Borges, G.; Schwenk J. (Eds.) Springer, Berlin
-
Borges, G.; Brennschneidt, K.: Rechtsfragen des Cloud Computing - ein Zwischenbericht. In Borges, G.; Schwenk J. (Eds.): Daten- und Identitätsschutz in Cloud Computing, E-Government und E-Commerce. Springer, Berlin, 2012, pp. 43-77.
-
(2012)
Daten- und Identitätsschutz in Cloud Computing, E-Government und E-Commerce
, pp. 43-77
-
-
Borges, G.1
Brennschneidt, K.2
-
2
-
-
63649117166
-
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
-
Buyya, R.; Yeo, C. S.; Venugopal, S.; Broberg, J.; Brandi, I.: Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. In: Future Generation Computer Systems, 25(6), 2009, pp. 599-616.
-
(2009)
Future Generation Computer Systems
, vol.25
, Issue.6
, pp. 599-616
-
-
Buyya, R.1
Yeo, C.S.2
Venugopal, S.3
Broberg, J.4
Brandi, I.5
-
4
-
-
84870205821
-
Cloud compliance: A framework for using cloud computing in a regulated world
-
N. Antonopoulos; L. Gillam (Eds.) Springer, London
-
Chaput, S. R.; Ringwood, K.: Cloud Compliance: A Framework for Using Cloud Computing in a Regulated World. In N. Antonopoulos; L. Gillam (Eds.): Cloud Computing - Principles, Systems and Applications. Springer, London, 2010, pp. 241-255.
-
(2010)
Cloud Computing - Principles, Systems and Applications
, pp. 241-255
-
-
Chaput, S.R.1
Ringwood, K.2
-
5
-
-
84858382654
-
The impact of cloud computing technology on legal infrastructure within internet - Focusing on the protection of information privacy
-
Harbin
-
Cheng, F.-C.; Lai, W.-H.: The Impact of Cloud Computing Technology on Legal Infrastructure within Internet - Focusing on the Protection of Information Privacy. In: Proceedings of the 2. International Workshop on Information and Electronics Engineering, Harbin, 2012, pp. 241-251.
-
(2012)
Proceedings of the 2. International Workshop on Information and Electronics Engineering
, pp. 241-251
-
-
Cheng, F.-C.1
Lai, W.-H.2
-
6
-
-
84872028984
-
Beyond location: Data security in the 21st century
-
Desai, D. R.: Beyond Location: Data Security in the 21st Century. In: Communications of the ACM, 56, 2013, pp. 34-36.
-
(2013)
Communications of the ACM
, vol.56
, pp. 34-36
-
-
Desai, D.R.1
-
7
-
-
84902260790
-
Datenschutz im "Cloud Computing" aus Anbietersicht
-
Borges, G.; Schwenk, J. (Eds.) Springer, Berlin
-
Eckhardt, J.: Datenschutz im "Cloud Computing" aus Anbietersicht. In Borges, G.; Schwenk, J. (Eds.): Daten-und Identitä tsschutz in Cloud Computing, E-Government und E-Commerce. Springer, Berlin, 2012, pp. 97-114.
-
(2012)
Daten-und Identitätsschutz in Cloud Computing, E-Government und E-Commerce
, pp. 97-114
-
-
Eckhardt, J.1
-
8
-
-
0003450326
-
-
Rowohlt, Reinbek
-
Flick, U.: Qualitative Forschung: Theorie, Methoden, Anwendung in Psychologie und Sozialwissenschaften, Rowohlt, Reinbek, 1995.
-
(1995)
Qualitative Forschung: Theorie, Methoden, Anwendung in Psychologie und Sozialwissenschaften
-
-
Flick, U.1
-
9
-
-
0742274240
-
The european data privacy directive
-
Fromholz, J. M.: The European data privacy directive. In: Berkeley Technology Law, 15, 2000, pp. 461-484.
-
(2000)
Berkeley Technology Law
, vol.15
, pp. 461-484
-
-
Fromholz, J.M.1
-
11
-
-
84902288886
-
Zertifizierte Cloud durch das EuroCloud Star Audit SaaS
-
Giebichenstein, R.; Weiss, A.: Zertifizierte Cloud durch das EuroCloud Star Audit SaaS. In: Datenschutz und Datensicherheit - DuD, 35 (5), 2011, pp. 338-342.
-
(2011)
Datenschutz und Datensicherheit - DuD
, vol.35
, Issue.5
, pp. 338-342
-
-
Giebichenstein, R.1
Weiss, A.2
-
12
-
-
84902244477
-
European data protection 2.0: New compliance requirements in sight - What the proposed EU data protection regulation means for U.S. Companies
-
Gilbert, F.: European Data Protection 2.0: New Compliance Requirements in Sight - What the Proposed EU Data Protection Regulation Means for U.S. Companies. In: Santa Clara Computer & High Technology Law Journal, 28 (4), 2012, pp. 815-863.
-
(2012)
Santa Clara Computer & High Technology Law Journal
, vol.28
, Issue.4
, pp. 815-863
-
-
Gilbert, F.1
-
13
-
-
84994303265
-
Proposed EU data protection regulation: The good, the bad, and the unknown
-
Gilbert, F.: Proposed EU data protection regulation: the good, the bad, and the unknown. In: Journal of Internet Law, 15 (10), 2012, pp. 20-34.
-
(2012)
Journal of Internet Law
, vol.15
, Issue.10
, pp. 20-34
-
-
Gilbert, F.1
-
14
-
-
84979819408
-
International data protection regulation: Data transfer - Safe harbor
-
Grant, J. International data protection regulation: Data transfer - safe harbor. In: Computer Law & Security Review, 21 (3), 2005, pp. 257-261.
-
(2005)
Computer Law & Security Review
, vol.21
, Issue.3
, pp. 257-261
-
-
Grant, J.1
-
15
-
-
33846102423
-
The nature of theory in information systems
-
Gregor, S.: The nature of theory in information systems. In: MIS Quarterly, 30 (3), 2006, pp. 611-642.
-
(2006)
MIS Quarterly
, vol.30
, Issue.3
, pp. 611-642
-
-
Gregor, S.1
-
16
-
-
6344289986
-
Enhancing privacy and data protection in electronic medical environments
-
Gritzalis, S.: Enhancing Privacy and Data Protection in Electronic Medical Environments. In: Journal of Medical Systems, 28 (6), 2004, pp. 535-547.
-
(2004)
Journal of Medical Systems
, vol.28
, Issue.6
, pp. 535-547
-
-
Gritzalis, S.1
-
17
-
-
84902267618
-
Datenschutz im Cloud Computing
-
Borges, G.; Schwenk J. (Eds.) Springer, Berlin
-
Hansen, M.: Datenschutz im Cloud Computing. In Borges, G.; Schwenk J. (Eds.): Daten- und Identitätsschutz in Cloud Computing, E-Government und E-Commerce. Springer, Berlin, 2012, pp. 79-95.
-
(2012)
Daten- und Identitätsschutz in Cloud Computing, E-Government und E-Commerce
, pp. 79-95
-
-
Hansen, M.1
-
18
-
-
84865521711
-
Top 10 mistakes in system design from a privacy perspective and privacy protection goals
-
Camenisch, J. (Ed.) Springer, Berlin
-
Hansen, M.: Top 10 Mistakes in System Design from a Privacy Perspective and Privacy Protection Goals. In Camenisch, J. (Ed.): Privacy and Identity Management for Life. Springer, Berlin, 2012, pp. 14-31.
-
(2012)
Privacy and Identity Management for Life
, pp. 14-31
-
-
Hansen, M.1
-
19
-
-
84902260321
-
Starke Behörden, schwaches Recht - Der neue EU-Datenschutzentwurf
-
Härting, N.: Starke Behörden, schwaches Recht - der neue EU-Datenschutzentwurf. In: Betriebs-Berater, 67 (8), 2012, pp. 459-466.
-
(2012)
Betriebs-Berater
, vol.67
, Issue.8
, pp. 459-466
-
-
Härting, N.1
-
20
-
-
84902241120
-
The regulatory framework for privacy and security
-
Hunsinger J. (Ed.) Springer, Dordrecht
-
Hiller, J. S.: The Regulatory Framework for Privacy and Security. In Hunsinger J. (Ed.): International Handbook of Internet Research. Springer, Dordrecht, 2010, pp. 251-265.
-
(2010)
International Handbook of Internet Research
, pp. 251-265
-
-
Hiller, J.S.1
-
21
-
-
84902250754
-
Negotiating cloud contracts - Looking at clouds from both sides now
-
Hon, W. K.; Millard, C.; Walden, I.: Negotiating Cloud Contracts - Looking at Clouds from Both Sides Now. In: Stanford Technology Law Review, 16 (1), 2012, pp. 79-128.
-
(2012)
Stanford Technology Law Review
, vol.16
, Issue.1
, pp. 79-128
-
-
Hon, W.K.1
Millard, C.2
Walden, I.3
-
22
-
-
80054081293
-
Semantics-enabled policies for information sharing and protection in the cloud
-
Singapore
-
Hu, Y.-J.; Wu, W.-N.; Yang, J.-J.: Semantics-Enabled Policies for Information Sharing and Protection in the Cloud. In: Proceedings of the 3. International Conference on Social Informatics, Singapore, 2011, pp. 198-211.
-
(2011)
Proceedings of the 3. International Conference on Social Informatics
, pp. 198-211
-
-
Hu, Y.-J.1
Wu, W.-N.2
Yang, J.-J.3
-
24
-
-
84902250672
-
Augmented environments and design
-
Lahlou, S. (Ed.) Springer, London
-
Lahlou, S.: Augmented Environments and Design. In Lahlou, S. (Ed.): Designing User Friendly Augmented Work Environments. Springer, London, 2010, pp. 1-29.
-
(2010)
Designing User Friendly Augmented Work Environments
, pp. 1-29
-
-
Lahlou, S.1
-
25
-
-
84884303879
-
SaaS und Unternehmenserfolg: Erfolgskategorien für die Praxis
-
Benlian, A. (Ed.) Gabler, Wiesbaden
-
Matros, R.; Rietze C.; Eymannm T.: SaaS und Unternehmenserfolg: Erfolgskategorien für die Praxis. In Benlian, A. (Ed.): Software-as-a-Service - Anbieterstrategien, Kundenbedürfnisse und Wertschöpfungsstrukturen. Gabler, Wiesbaden, 2010, pp. 239-254.
-
(2010)
Software-as-a-Service - Anbieterstrategien, Kundenbedürfnisse und Wertschöpfungsstrukturen
, pp. 239-254
-
-
Matros, R.1
Rietze, C.2
Eymannm, T.3
-
26
-
-
84865485500
-
Early lessons learned in the ENDORSE project: Legal challenges and possibilities in developing data protection compliance software
-
Camenisch, J. (Ed.) Springer, Berlin
-
Olislaegers, S.: Early Lessons Learned in the ENDORSE Project: Legal Challenges and Possibilities in Developing Data Protection Compliance Software. In Camenisch, J. (Ed.): Privacy and Identity Management for Life. Springer, Berlin, 2012, pp. 73-87.
-
(2012)
Privacy and Identity Management for Life
, pp. 73-87
-
-
Olislaegers, S.1
-
27
-
-
33845886135
-
Research methodologies in MIS: An update
-
Palvia, P.; Leary, D.; Mao, E.; Midha, V.; Pinjani, P.; Salam, A.F.: Research Methodologies in MIS: An Update. In: Communications of the Association for Information Systems, 14 (14), 2004, pp. 526-542.
-
(2004)
Communications of the Association for Information Systems
, vol.14
, Issue.14
, pp. 526-542
-
-
Palvia, P.1
Leary, D.2
Mao, E.3
Midha, V.4
Pinjani, P.5
Salam, A.F.6
-
28
-
-
84863498411
-
Privacy, security and trust in cloud computing
-
Pearson, S.; Yee, G. (Ed.) Springer, London
-
Pearson, S.: Privacy, Security and Trust in Cloud Computing. In Pearson, S.; Yee, G. (Ed.): Privacy and Security for Cloud Computing. Springer, London, 2013, pp. 3-42.
-
(2013)
Privacy and Security for Cloud Computing
, pp. 3-42
-
-
Pearson, S.1
-
29
-
-
79960746541
-
Regulatory impact of data protection and privacy in the cloud
-
Wakeman, I. (Ed.) Copenhagen Proceedings. Springer, Berlin, 2011
-
Porwal, S.; Nair, S.K.; Dimitrakos, T.: Regulatory Impact of Data Protection and Privacy in the Cloud. In Wakeman, I. (Ed.): Trust Management V - 5th IFIP WG 11.11 International Conference, IFIPTM 2011, Copenhagen, 2011. Proceedings. Springer, Berlin, 2011, pp. 290-299.
-
(2011)
Trust Management V - 5th IFIP WG 11.11 International Conference, IFIPTM 2011
, pp. 290-299
-
-
Porwal, S.1
Nair, S.K.2
Dimitrakos, T.3
-
30
-
-
84902297022
-
Datenschutzrechtliche Anforderungen an die Sicherheit der Kommunikation im Internet
-
Borges, G.; Schwenk, J. (Eds.) Springer, Berlin
-
Schneider, J.: Datenschutzrechtliche Anforderungen an die Sicherheit der Kommunikation im Internet. In Borges, G.; Schwenk, J. (Eds.): Daten- und Identitätsschutz in Cloud Computing, E-Government und E-Commerce. Springer, Berlin, 2012, pp. 21-42.
-
(2012)
Daten- und Identitätsschutz in Cloud Computing, E-Government und E-Commerce
, pp. 21-42
-
-
Schneider, J.1
-
32
-
-
7644223159
-
Maintaining privacy in pervasive computing - Enabling acceptance of sensor-based services
-
Soppera, A.; Burbridge, T.: Maintaining Privacy in Pervasive Computing - Enabling Acceptance of Sensor-Based Services. In: BT Technology Journal, 22 (3), 2004, pp. 106-118.
-
(2004)
BT Technology Journal
, vol.22
, Issue.3
, pp. 106-118
-
-
Soppera, A.1
Burbridge, T.2
-
33
-
-
84902247455
-
Rechtliche Rahmenbedingungen des "Software as a Service"- Konzepts
-
Benlian, A. (Ed.) Gabler, Wiesbaden
-
Spindler, G.: Rechtliche Rahmenbedingungen des "Software as a Service"-Konzepts. In Benlian, A. (Ed.): Software-as-a-Service - Anbieterstrategien, Kundenbedürfnisse und Wertschöpfungsstrukturen. Gabler, Wiesbaden, 2010, pp. 31-40.
-
(2010)
Software-as-a-Service - Anbieterstrategien, Kundenbedürfnisse und Wertschöpfungsstrukturen
, pp. 31-40
-
-
Spindler, G.1
-
34
-
-
84865740013
-
Der Entwurf einer europäischen Datenschutz-Grundverordnung - Gefahren für die medizi-nische Forschung
-
Taupitz, J.: Der Entwurf einer europäischen Datenschutz- Grundverordnung - Gefahren für die medizi-nische Forschung. In: Medizinrecht, 30 (8), 2012, pp. 423-428.
-
(2012)
Medizinrecht
, vol.30
, Issue.8
, pp. 423-428
-
-
Taupitz, J.1
-
36
-
-
84870674396
-
Reconstructing the giant: On the importance of rigour in documenting the literature search process
-
Verona
-
Vom Brocke, J.; Simons, A.; Niehaves, B.; Riemer, K.; Plattfaut, R.; Cleven, A.: Reconstructing the Giant: On the Importance of Rigour in Documenting the Literature Search Process. In: Proceedings of the 17. European Conference On Information Systems, Verona, 2009, pp. 2206-2217.
-
(2009)
Proceedings of the 17. European Conference on Information Systems
, pp. 2206-2217
-
-
Vom Brocke, J.1
Simons, A.2
Niehaves, B.3
Riemer, K.4
Plattfaut, R.5
Cleven, A.6
-
37
-
-
0012903874
-
Analyzing the past to prepare for the future: Writing a literature review
-
Webster, J.; Watson, R. T.: Analyzing the Past to Prepare For the Future: Writing a Literature Review. In: MIS Quarterly, 26 (2), 2002, pp. 13-23.
-
(2002)
MIS Quarterly
, vol.26
, Issue.2
, pp. 13-23
-
-
Webster, J.1
Watson, R.T.2
-
38
-
-
84902241182
-
Cloud Computing und Datenschutz
-
Weichert, T.: Cloud Computing und Datenschutz. In: Datenschutz und Datensicherheit - DuD, 34 (10), 2010, pp. 679-687.
-
(2010)
Datenschutz und Datensicherheit - DuD
, vol.34
, Issue.10
, pp. 679-687
-
-
Weichert, T.1
-
40
-
-
84979819344
-
International data transfers between the United States and the European union: Are the procedural provisions of the safe harbor solution adequate?
-
Zinser, A.: International data transfers between the United States and the European Union: are the procedural provisions of the Safe Harbor solution adequate?. In: Computer Law & Security Review, 20 (3), 2004, pp. 182-184.
-
(2004)
Computer Law & Security Review
, vol.20
, Issue.3
, pp. 182-184
-
-
Zinser, A.1
-
41
-
-
84927648796
-
Privacy protection goals and their implications for eID systems
-
Camenisch, J. (Ed.) Springer, Berlin
-
Zwingelberg, H.; Hansen, M.: Privacy Protection Goals and Their Implications for eID Systems. In Camenisch, J. (Ed.): Privacy and Identity Management for Life. Springer, Berlin, 2012, pp. 14-31.
-
(2012)
Privacy and Identity Management for Life
, pp. 14-31
-
-
Zwingelberg, H.1
Hansen, M.2
|